Karuppusamy Thenmozhi

Orcid: 0000-0001-9829-0189

Affiliations:
  • SASTRA Deemed University, Thanjavur, TamilNadu, India


According to our database1, Karuppusamy Thenmozhi authored at least 39 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Misconstrued voice on SC-FDMA for secured comprehension - a cooperative influence of DWT and ECC.
Multim. Tools Appl., 2022

2021
Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach.
Neural Process. Lett., 2021

MUX induced Ring oscillators for encrypted Nano communication via Quantum Dot Cellular Automata.
Nano Commun. Networks, 2021

Neural-assisted image-dependent encryption scheme for medical image cloud storage.
Neural Comput. Appl., 2021

A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images.
Multim. Tools Appl., 2021

Genetic and chaotic signatures in offspring - an encrypted generation of image family.
Multim. Tools Appl., 2021

Hybrid spectrum management using integrated fuzzy and femtocells in cognitive domain.
J. Intell. Fuzzy Syst., 2021

2020
Real Time Authenticated Spectrum Access and Encrypted Image Transmission via Cloud Enabled Fusion centre.
Wirel. Pers. Commun., 2020

Hopfield attractor-trusted neural network: an attack-resistant image encryption.
Neural Comput. Appl., 2020

ECC joins first time with SC-FDMA for Mission "security".
Multim. Tools Appl., 2020

Image encryption through RNA approach assisted with neural key sequences.
Multim. Tools Appl., 2020

Con(dif)fused voice to convey secret: a dual-domain approach.
Multim. Syst., 2020

Non-spectral features-based robust speaker independent emotion recognition from speech signal.
Int. J. Medical Eng. Informatics, 2020

Advanced framework for highly secure and cloud-based storage of colour images.
IET Image Process., 2020

2019
Detecting and Mitigating Selfish Primary Users in Cognitive Radio.
Wirel. Pers. Commun., 2019

Person authentication using speech as a biometric against play back attacks.
Multim. Tools Appl., 2019

Open hiding for truncating hackers - a block truncation and wavelet approach.
Multim. Tools Appl., 2019

Indicator-based lightweight steganography on 32-bit RISC architectures for IoT security.
Multim. Tools Appl., 2019

A cloud compatible DNA coded security solution for multimedia file sharing & storage.
Multim. Tools Appl., 2019

Realization of Chaos-Based Private Multiprocessor Network Via USART of Embedded Devices.
Proceedings of the Handbook of Multimedia Information Security: Techniques and Applications., 2019

2018
Transreceiving of encrypted medical image - a cognitive approach.
Multim. Tools Appl., 2018

Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller.
Microprocess. Microsystems, 2018

Survey of various methods for diagnostic signatures for cutaneous melanoma from genetic and imaging data.
Int. J. Bus. Intell. Data Min., 2018

Encryption and watermark-treated medical image against hacking disease - An immune convention in spatial and frequency domains.
Comput. Methods Programs Biomed., 2018

2017
Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network.
Wirel. Pers. Commun., 2017

Fusion of confusion and diffusion: a novel image encryption approach.
Telecommun. Syst., 2017

Mojette (d) Secret Image "SEDIH" in an Encrypted Double Image - A Histo Approach.
Int. J. Netw. Secur., 2017

2016
Analyzing three-party authentication and key agreement protocol for real time IP multimedia server-client systems.
Multim. Tools Appl., 2016

Analyzing secure key authentication and key agreement protocol for promising features of IP multimedia subsystem using IP multimedia server-client systems.
Multim. Tools Appl., 2016

Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique.
Int. J. Digit. Multim. Broadcast., 2016

2015
Analyzing Threefold Schemes for Enhancing Communication Channel Efficiencies Using IP Multimedia Server-Client Systems for LTE Networks.
Wirel. Pers. Commun., 2015

Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server-Client Systems.
Wirel. Pers. Commun., 2015

A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System.
Wirel. Pers. Commun., 2015

Triple chaotic image scrambling on RGB - a random image encryption approach.
Secur. Commun. Networks, 2015

Authentication scheme to combat a primary user emulation attack against cognitive radio users.
Secur. Commun. Networks, 2015

Medical data sheet in safe havens - A tri-layer cryptic solution.
Comput. Biol. Medicine, 2015

2013
Space Diversity Knotted with WiMAX- A Way for Undistorted and Anti-Corruptive Channel.
Wirel. Pers. Commun., 2013

IP Multimedia Subsystem - An Intrusion Detection System.
Smart Comput. Rev., 2013

Interoperation Key Schema for Social Media Tools in IP Multimedia Subsystem.
J. Commun., 2013


  Loading...